DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Humboldt State University notifies 5,700 students that e-mail attachment error exposed their Social Security Numbers

Posted on March 14, 2012 by Dissent

The following statement was issued by Humboldt State University yesterday:

Humboldt State University is alerting approximately 5,700 students to take precautions against identity theft in the wake of a single incident involving one student’s personal information.

The affected files have been secured and HSU has verified it was a single incident. It is unlikely the privacy and the personal information of other students have been breached, but a notification letter to them recommends obtaining a credit report as a precaution against unusual activity.

The letter to all potentially affected students details the incident, suggests precautions and informs students that the many information security procedures and practices the University has in place are being reviewed. Security measures are reassessed regularly for their effectiveness and enforcement.

The letter of notification explains that personal information was included inadvertently as an attachment to an email which was transmitted in response to a legitimate data request. The affected party alerted the university immediately and HSU verified that all copies of the file were removed from the system.

California residents are entitled to a free credit report annually. A report or fraud alert from one or more credit agencies is available at www.annualcreditreport.com. Periodic reviews are effective against identity theft.

The website of the Office of Privacy Protection of the California Department of Consumer Affairs posts helpful information concerning personal privacy. The address isprivacy.ca.gov.

Anyone who may have been affected or who has follow-up questions is encouraged to dial the Humboldt State Information Security Office at 707/826-3815. Full information is posted at humboldt.edu/security.

The letter of notification is posted at humboldt.edu/letter312.html.

That first sentence may be a bit confusing. It was a single incident, but it didn’t involve just one student’s personal information. As explained in their notification letter, an e-mail attachment error exposed 5,700 students’ names, addresses, and Social Security numbers to another student.

h/t, Redwood Times


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Breach IncidentsEducation SectorExposureU.S.

Post navigation

← Another Mass Deface by Bangladeshi Grey Hat Hackers.
Victims of TRICARE data theft report financial fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.